This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controlle...This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.展开更多
In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into ...In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.展开更多
Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimens...Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimensional system of“safety and stability-economic feasibility-low-carbon and environmental protection,”an influencing factor system for the“Energy Trilemma”in the natural gas industry is constructed.展开更多
Dear Editor,This letter presents a novel approach to the data-driven control of unknown nonlinear systems.By leveraging online sparse identification based on the Koopman operator,a high-dimensional linear system model...Dear Editor,This letter presents a novel approach to the data-driven control of unknown nonlinear systems.By leveraging online sparse identification based on the Koopman operator,a high-dimensional linear system model approximating the actual system is obtained online.The upper bound of the discrepancy between the identified model and the actual system is estimated using real-time prediction error,which is then utilized in the design of a tube-based robust model predictive controller.The effectiveness of the proposed approach is validated by numerical simulation.展开更多
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de...Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels.展开更多
In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and d...In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and discourses.Building an independent human rights knowledge system has become a core academic focus in China’s human rights research field.Upholding fundamental principles and breaking new ground are the key methodological principles for the process.China’s human rights research should be rooted in the“cultural lineage”by preserving the essence of fine traditional Chinese culture,guided by the“moral lineage”by adhering to the Marxist view on human rights,and anchored in the“Four-sphere Confidence”by upholding a distinct human rights development path,so as to define the historical coordinates and value stance of China’s independent human rights knowledge system.Meanwhile,it should maintain a high degree of openness in knowledge,theory,and methodology to address emerging rights demands and contribute to building a new global human rights governance order,so as to underscore the mission of China’s independent human rights knowledge system in the contemporary era and China’s responsibility as a major global actor.China’s human rights research should uphold the dialectical unity between the fundamental principles and innovations,and advance the systemic and theoretical interpretation of its independent human rights knowledge.展开更多
With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynami...With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynamic drought index,a regional drought identifying system was developed for the watershed between the reach of the Yangtze River and Huaihe River in Anhui Province by using VC++ working platform and Access database.This drought identifying system would be very useful to forecast and early warn the happening of drought in this area.展开更多
CR Dhan 310(CRD310),a biofortified rice variety,contains a significantly higher level of grain protein compared with its recurrent parent Naveen(NV),as well as most adapted high-yielding rice varieties in India.Althou...CR Dhan 310(CRD310),a biofortified rice variety,contains a significantly higher level of grain protein compared with its recurrent parent Naveen(NV),as well as most adapted high-yielding rice varieties in India.Although a limited investigation depicted that CRD310 contained higher levels of glutelin and some essential amino acids,detailed biochemical,molecular,and cellular mechanisms remain to be studied.As one of the means to identify the proteins and understand the underlying mechanism of higher proteins accumulation in grains of CRD310,the comparative proteomics was undertaken on grains of CRD310 and NV at the yellow ripening stage.展开更多
Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an ...Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.展开更多
The Neogene Shawan Formation in the Chepaizi Uplift of the Junggar Basin(NW China)has obtained high oil flow,demonstrating a good potential for oil and gas exploration.The multi-source hydrocarbon generation backgroun...The Neogene Shawan Formation in the Chepaizi Uplift of the Junggar Basin(NW China)has obtained high oil flow,demonstrating a good potential for oil and gas exploration.The multi-source hydrocarbon generation background and strong tectonic activity have led to the simultaneous production of heavy oil and light oil from multi-layer in the area,which makes it very difficult to identify oil origins,presently,the hot debate on the oil origins needs to be clarified.In this paper,due to the selective consumption of different types of compounds in crude oils by severe and intense biodegradation,the commonly used oilsource correlation tools are ineffective or may produce misleading results,this study adopted a biomarker recovery method based on the principle of mass conservation that uses the sum of the mass of the residual biomarkers and their corresponding biodegradation products to obtain the mass of the original biomarkers,improving the reliability of oil origins determination.Based on the nature and occurrence of crude oils,the investigated oils are subdivided into three types,Group A,Group B and Group C.Group A,light oils occurred mainly in lower structure Neogene Shawan Formation in the western Chepaizi Uplift,while Group B,heavy oils occurred mainly in higher structure Neogene Shawan Formation in the western Chepaizi Uplift.The two types of crude oils may come from the mixed source of Jurassic Badaowan Formation source rocks(J_(1)b)and Paleogene Anjihaihe Formation source rocks(E_(2-3)a)in the Sikeshu Sag,and Jurassic Badaowan Formation source rocks(J_(1)b)are the main source of crude oils.Group C,heavy oils occurred mainly in Neogene Shawan Formation in the eastern Chepaizi Uplift,showing good correlation with the Permian(P_(1)f and P_(2)w)source rocks in the Shawan Sag.At the same time,by combining stable carbon isotope and parameters related to triaromatic steroids,the accuracy of the oilsource correlation results by biomarker recovery method was further verified.展开更多
A sensitive and convenient method for the study of electrochemical fingerprints of Chrysanthemums from different regions is studied by Belousov-Zhabotinskii(B-Z) oscillation system with malonate as a dissipative mat...A sensitive and convenient method for the study of electrochemical fingerprints of Chrysanthemums from different regions is studied by Belousov-Zhabotinskii(B-Z) oscillation system with malonate as a dissipative material.The results indicated that the electrochemical fingerprints of Chrysanthemums from different regions show significantly different characteristics,and can be used to identify the regions of Chrysanthemums.展开更多
The abuse of antibiotics has brought great harm to the human living environment and health,so it is extremely significant to develop an efficient and simple method to detect trace antibiotic residues in various wastew...The abuse of antibiotics has brought great harm to the human living environment and health,so it is extremely significant to develop an efficient and simple method to detect trace antibiotic residues in various wastewaters.Herein,a new two-dimensional(2D)Cd-based metal−organic framework(Cd-MOF,namely LCU-111)and its mixed matrix membranes(MMMs)is sifted as luminescence sensors for efficient monitoring antibiotic nitrofurazone(NFZ)in various aqueous systems and applied as visible fingerprint identifying.The LCU-111 has good selectivity,sensibility,reproducibility and anti-interference for luminescent quenching NFZ with low detection limits(LODs)of 0.4567,0.3649 and 0.8071 ppm in aqueous solution,HEPES biological buffer,and real urban Tuhai River water,respectively.Interestingly,the luminescent test papers and MMMs allow the NFZ sensing easier and more rapid by naked eyes,only with a low LOD of 0.8117 ppm for MMMs sensor.Notably,by combining multiple experiments with density functional theory(DFT)calculations,the photo-induced electron transfer(PET)quenching mechanism is further elucidated.More importantly,potential practical applications of LCU-111 for latent fingerprint visualization provide lifelike evidences for effective identification of individuals,which can be applied in criminal investigation.展开更多
We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators ar...We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.展开更多
We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For th...We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.展开更多
Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is a...Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is an emerging consensus that neurons have different intrinsic regenerative capabilities,which theoretically could be manipulated therapeutically to improve regeneration.Population-based comparisons between"good regenerating"and"bad regenerating"neurons in the CNS and peripheral nervous system of most vertebrates yield results that are inconclusive or difficult to interpret.At least in part,this reflects the great diversity of cells in the mammalian CNS.Using mammalian nervous system imposes several methodical limitations.First,the small sizes and large numbers of neurons in the CNS make it very difficult to distinguish regenerating neurons from non-regenerating ones.Second,the lack of identifiable neurons makes it impossible to correlate biochemical changes in a neuron with axonal damage of the same neuron,and therefore,to dissect the molecular mechanisms of regeneration on the level of single neurons.This review will survey the reported responses to axon injury and the determinants of axon regeneration,emphasizing non-mammalian model organisms,which are often under-utilized,but in which the data are especially easy to interpret.展开更多
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resourc...Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.展开更多
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
文摘This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.
文摘In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.
基金Western Project of the National Social Science Fund of China (22XGL019)Major Project of the National Social Science Fund of China (22&ZD105)+1 种基金Special Academic Research Grant at the Key Research Base of Philosophy and Social Sciences in Sichuan Province (SC24E091)Chengdu Philosophy and Social Science Planning Project 2024 (2024BS072)。
文摘Clarifying the system structure of various influencing factors is a crucial prerequisite for identifying the key action point to address the“Energy Trilemma”in China’s natural gas industry.Based on the three-dimensional system of“safety and stability-economic feasibility-low-carbon and environmental protection,”an influencing factor system for the“Energy Trilemma”in the natural gas industry is constructed.
基金supported by the National Natural Science Foundation of China(62473020).
文摘Dear Editor,This letter presents a novel approach to the data-driven control of unknown nonlinear systems.By leveraging online sparse identification based on the Koopman operator,a high-dimensional linear system model approximating the actual system is obtained online.The upper bound of the discrepancy between the identified model and the actual system is estimated using real-time prediction error,which is then utilized in the design of a tube-based robust model predictive controller.The effectiveness of the proposed approach is validated by numerical simulation.
基金supported in part by the National Science Foundation of China(62373240,62273224,U24A20259).
文摘Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels.
基金a phased result funded by the Special Funds for Basic Scientific Research Expenses of Universities under the Central Government(24CXTD01).
文摘In 2024,China’s human rights research has assumed a distinct“autonomy-oriented shift,”with scholars beginning to refine and construct uniquely Chinese and locally identifiable human rights concepts,categories,and discourses.Building an independent human rights knowledge system has become a core academic focus in China’s human rights research field.Upholding fundamental principles and breaking new ground are the key methodological principles for the process.China’s human rights research should be rooted in the“cultural lineage”by preserving the essence of fine traditional Chinese culture,guided by the“moral lineage”by adhering to the Marxist view on human rights,and anchored in the“Four-sphere Confidence”by upholding a distinct human rights development path,so as to define the historical coordinates and value stance of China’s independent human rights knowledge system.Meanwhile,it should maintain a high degree of openness in knowledge,theory,and methodology to address emerging rights demands and contribute to building a new global human rights governance order,so as to underscore the mission of China’s independent human rights knowledge system in the contemporary era and China’s responsibility as a major global actor.China’s human rights research should uphold the dialectical unity between the fundamental principles and innovations,and advance the systemic and theoretical interpretation of its independent human rights knowledge.
基金Supported by Special Fund for Public Welfare Meteorology Industry (GYHY201106029)
文摘With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynamic drought index,a regional drought identifying system was developed for the watershed between the reach of the Yangtze River and Huaihe River in Anhui Province by using VC++ working platform and Access database.This drought identifying system would be very useful to forecast and early warn the happening of drought in this area.
基金supported by the director of Indian Council of Agricultural Research and International Rice Research Institute (ICAR-CRRI), Cuttack, Indiathe coordinator of the ICAR-sponsored project ‘C-reactive protein (CRP) in Biofortification in Selected Crops’, India
文摘CR Dhan 310(CRD310),a biofortified rice variety,contains a significantly higher level of grain protein compared with its recurrent parent Naveen(NV),as well as most adapted high-yielding rice varieties in India.Although a limited investigation depicted that CRD310 contained higher levels of glutelin and some essential amino acids,detailed biochemical,molecular,and cellular mechanisms remain to be studied.As one of the means to identify the proteins and understand the underlying mechanism of higher proteins accumulation in grains of CRD310,the comparative proteomics was undertaken on grains of CRD310 and NV at the yellow ripening stage.
基金supported by Punjab Agricultural University,Ludhiana,India,for providing the infrastructure and other facilities for conducting experiments.All other forms of support and financial assistance are duly acknowledged.
文摘Brown spot(BS)of rice,caused by Bipolaris oryzae,is a serious concern that not only causes quantitative losses but also affects grain quality.To manage this disease,the use of resistant genetic sources and QTLs is an eco-friendly and economical option.In the current study,F_(3) progenies derived from a cross of susceptible parent PMS-18-B(PAU 10845-1-1-1-1)×resistant parent RP Path 77(RP patho-17)were used to identify potential QTLs linked to BS resistance and to associate this resistance with a temporal spike in defense-related enzymes.
基金co-funded by the National Natural Science Foundation of China(42372160,42072172)。
文摘The Neogene Shawan Formation in the Chepaizi Uplift of the Junggar Basin(NW China)has obtained high oil flow,demonstrating a good potential for oil and gas exploration.The multi-source hydrocarbon generation background and strong tectonic activity have led to the simultaneous production of heavy oil and light oil from multi-layer in the area,which makes it very difficult to identify oil origins,presently,the hot debate on the oil origins needs to be clarified.In this paper,due to the selective consumption of different types of compounds in crude oils by severe and intense biodegradation,the commonly used oilsource correlation tools are ineffective or may produce misleading results,this study adopted a biomarker recovery method based on the principle of mass conservation that uses the sum of the mass of the residual biomarkers and their corresponding biodegradation products to obtain the mass of the original biomarkers,improving the reliability of oil origins determination.Based on the nature and occurrence of crude oils,the investigated oils are subdivided into three types,Group A,Group B and Group C.Group A,light oils occurred mainly in lower structure Neogene Shawan Formation in the western Chepaizi Uplift,while Group B,heavy oils occurred mainly in higher structure Neogene Shawan Formation in the western Chepaizi Uplift.The two types of crude oils may come from the mixed source of Jurassic Badaowan Formation source rocks(J_(1)b)and Paleogene Anjihaihe Formation source rocks(E_(2-3)a)in the Sikeshu Sag,and Jurassic Badaowan Formation source rocks(J_(1)b)are the main source of crude oils.Group C,heavy oils occurred mainly in Neogene Shawan Formation in the eastern Chepaizi Uplift,showing good correlation with the Permian(P_(1)f and P_(2)w)source rocks in the Shawan Sag.At the same time,by combining stable carbon isotope and parameters related to triaromatic steroids,the accuracy of the oilsource correlation results by biomarker recovery method was further verified.
文摘A sensitive and convenient method for the study of electrochemical fingerprints of Chrysanthemums from different regions is studied by Belousov-Zhabotinskii(B-Z) oscillation system with malonate as a dissipative material.The results indicated that the electrochemical fingerprints of Chrysanthemums from different regions show significantly different characteristics,and can be used to identify the regions of Chrysanthemums.
基金supported by the National Natural Science Foundation of China(Nos.21771095 and 22061019)the Natural Science Foundation of Shandong Province(Nos.ZR2021MB114 and ZR2021MB073)the Youth Innovation Team of Shandong Colleges and Universities(No.2019KJC027).
文摘The abuse of antibiotics has brought great harm to the human living environment and health,so it is extremely significant to develop an efficient and simple method to detect trace antibiotic residues in various wastewaters.Herein,a new two-dimensional(2D)Cd-based metal−organic framework(Cd-MOF,namely LCU-111)and its mixed matrix membranes(MMMs)is sifted as luminescence sensors for efficient monitoring antibiotic nitrofurazone(NFZ)in various aqueous systems and applied as visible fingerprint identifying.The LCU-111 has good selectivity,sensibility,reproducibility and anti-interference for luminescent quenching NFZ with low detection limits(LODs)of 0.4567,0.3649 and 0.8071 ppm in aqueous solution,HEPES biological buffer,and real urban Tuhai River water,respectively.Interestingly,the luminescent test papers and MMMs allow the NFZ sensing easier and more rapid by naked eyes,only with a low LOD of 0.8117 ppm for MMMs sensor.Notably,by combining multiple experiments with density functional theory(DFT)calculations,the photo-induced electron transfer(PET)quenching mechanism is further elucidated.More importantly,potential practical applications of LCU-111 for latent fingerprint visualization provide lifelike evidences for effective identification of individuals,which can be applied in criminal investigation.
基金supported by the National Science Foundation under Award#1823951-1823983。
文摘We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.
基金the National Natural Science Foundation of China (No.K411331528)
文摘We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.
基金supported by 85310-PHI Shriners Research Foundation(to MIS)NIH R01 NS092876(to MES)
文摘Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is an emerging consensus that neurons have different intrinsic regenerative capabilities,which theoretically could be manipulated therapeutically to improve regeneration.Population-based comparisons between"good regenerating"and"bad regenerating"neurons in the CNS and peripheral nervous system of most vertebrates yield results that are inconclusive or difficult to interpret.At least in part,this reflects the great diversity of cells in the mammalian CNS.Using mammalian nervous system imposes several methodical limitations.First,the small sizes and large numbers of neurons in the CNS make it very difficult to distinguish regenerating neurons from non-regenerating ones.Second,the lack of identifiable neurons makes it impossible to correlate biochemical changes in a neuron with axonal damage of the same neuron,and therefore,to dissect the molecular mechanisms of regeneration on the level of single neurons.This review will survey the reported responses to axon injury and the determinants of axon regeneration,emphasizing non-mammalian model organisms,which are often under-utilized,but in which the data are especially easy to interpret.
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
基金supported by the Project (No.2005CB321902) of Major State Basic Research Development (973)Project (No.yzdj0705) of Information Security Key Laboratory of the General Office of CPC Central Committee of China
文摘Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.